Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 09:59
Static task
static1
Behavioral task
behavioral1
Sample
f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe
-
Size
227KB
-
MD5
f87b58d86ef145e2733f639ec026ae7b
-
SHA1
0c972f1bdd17a707a6b6e1c2a5591be52f0130a5
-
SHA256
a37c4ab377ffa605695dcfd0a7a68aa3d2277ffa421923472754473e38e30e48
-
SHA512
142d1012ee4d74d27e28db249447a0cb38ef48c9ea63bd45f593c8670cc437801d8e2bd26d3f5ba84d9dc681c244696d564525234d2a88fcb5b21cd7a00c1886
-
SSDEEP
6144:+tdcKitBJqYOVePsP1M+xiQOK6gyw1zqH/F14r:m+tLOEoS+xxOkywQ/PA
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 42 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation igfxdmx32.exe -
Deletes itself 1 IoCs
pid Process 2176 igfxdmx32.exe -
Executes dropped EXE 42 IoCs
pid Process 2176 igfxdmx32.exe 2892 igfxdmx32.exe 1764 igfxdmx32.exe 1464 igfxdmx32.exe 4608 igfxdmx32.exe 448 igfxdmx32.exe 1520 igfxdmx32.exe 4472 igfxdmx32.exe 4880 igfxdmx32.exe 2232 igfxdmx32.exe 1420 igfxdmx32.exe 1748 igfxdmx32.exe 4940 igfxdmx32.exe 3396 igfxdmx32.exe 2740 igfxdmx32.exe 4796 igfxdmx32.exe 2016 igfxdmx32.exe 4680 igfxdmx32.exe 3104 igfxdmx32.exe 876 igfxdmx32.exe 2844 igfxdmx32.exe 1524 igfxdmx32.exe 3832 igfxdmx32.exe 1428 igfxdmx32.exe 4084 igfxdmx32.exe 3084 igfxdmx32.exe 3524 igfxdmx32.exe 2796 igfxdmx32.exe 1972 igfxdmx32.exe 3848 igfxdmx32.exe 2764 igfxdmx32.exe 3928 igfxdmx32.exe 4952 igfxdmx32.exe 2600 igfxdmx32.exe 4840 igfxdmx32.exe 5072 igfxdmx32.exe 2440 igfxdmx32.exe 4400 igfxdmx32.exe 548 igfxdmx32.exe 4432 igfxdmx32.exe 4964 igfxdmx32.exe 4596 igfxdmx32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmx32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmx32.exe File opened for modification C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe File created C:\Windows\SysWOW64\igfxdmx32.exe igfxdmx32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmx32.exe -
Modifies registry class 42 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmx32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2176 igfxdmx32.exe 2892 igfxdmx32.exe 2892 igfxdmx32.exe 2892 igfxdmx32.exe 2892 igfxdmx32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 2176 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 83 PID 4468 wrote to memory of 2176 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 83 PID 4468 wrote to memory of 2176 4468 f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe 83 PID 2176 wrote to memory of 2892 2176 igfxdmx32.exe 91 PID 2176 wrote to memory of 2892 2176 igfxdmx32.exe 91 PID 2176 wrote to memory of 2892 2176 igfxdmx32.exe 91 PID 2892 wrote to memory of 1764 2892 igfxdmx32.exe 94 PID 2892 wrote to memory of 1764 2892 igfxdmx32.exe 94 PID 2892 wrote to memory of 1764 2892 igfxdmx32.exe 94 PID 1764 wrote to memory of 1464 1764 igfxdmx32.exe 99 PID 1764 wrote to memory of 1464 1764 igfxdmx32.exe 99 PID 1764 wrote to memory of 1464 1764 igfxdmx32.exe 99 PID 1464 wrote to memory of 4608 1464 igfxdmx32.exe 100 PID 1464 wrote to memory of 4608 1464 igfxdmx32.exe 100 PID 1464 wrote to memory of 4608 1464 igfxdmx32.exe 100 PID 4608 wrote to memory of 448 4608 igfxdmx32.exe 101 PID 4608 wrote to memory of 448 4608 igfxdmx32.exe 101 PID 4608 wrote to memory of 448 4608 igfxdmx32.exe 101 PID 448 wrote to memory of 1520 448 igfxdmx32.exe 102 PID 448 wrote to memory of 1520 448 igfxdmx32.exe 102 PID 448 wrote to memory of 1520 448 igfxdmx32.exe 102 PID 1520 wrote to memory of 4472 1520 igfxdmx32.exe 103 PID 1520 wrote to memory of 4472 1520 igfxdmx32.exe 103 PID 1520 wrote to memory of 4472 1520 igfxdmx32.exe 103 PID 4472 wrote to memory of 4880 4472 igfxdmx32.exe 106 PID 4472 wrote to memory of 4880 4472 igfxdmx32.exe 106 PID 4472 wrote to memory of 4880 4472 igfxdmx32.exe 106 PID 4880 wrote to memory of 2232 4880 igfxdmx32.exe 108 PID 4880 wrote to memory of 2232 4880 igfxdmx32.exe 108 PID 4880 wrote to memory of 2232 4880 igfxdmx32.exe 108 PID 2232 wrote to memory of 1420 2232 igfxdmx32.exe 109 PID 2232 wrote to memory of 1420 2232 igfxdmx32.exe 109 PID 2232 wrote to memory of 1420 2232 igfxdmx32.exe 109 PID 1420 wrote to memory of 1748 1420 igfxdmx32.exe 110 PID 1420 wrote to memory of 1748 1420 igfxdmx32.exe 110 PID 1420 wrote to memory of 1748 1420 igfxdmx32.exe 110 PID 1748 wrote to memory of 4940 1748 igfxdmx32.exe 111 PID 1748 wrote to memory of 4940 1748 igfxdmx32.exe 111 PID 1748 wrote to memory of 4940 1748 igfxdmx32.exe 111 PID 4940 wrote to memory of 3396 4940 igfxdmx32.exe 112 PID 4940 wrote to memory of 3396 4940 igfxdmx32.exe 112 PID 4940 wrote to memory of 3396 4940 igfxdmx32.exe 112 PID 3396 wrote to memory of 2740 3396 igfxdmx32.exe 113 PID 3396 wrote to memory of 2740 3396 igfxdmx32.exe 113 PID 3396 wrote to memory of 2740 3396 igfxdmx32.exe 113 PID 2740 wrote to memory of 4796 2740 igfxdmx32.exe 114 PID 2740 wrote to memory of 4796 2740 igfxdmx32.exe 114 PID 2740 wrote to memory of 4796 2740 igfxdmx32.exe 114 PID 2016 wrote to memory of 4680 2016 igfxdmx32.exe 116 PID 2016 wrote to memory of 4680 2016 igfxdmx32.exe 116 PID 2016 wrote to memory of 4680 2016 igfxdmx32.exe 116 PID 4680 wrote to memory of 3104 4680 igfxdmx32.exe 117 PID 4680 wrote to memory of 3104 4680 igfxdmx32.exe 117 PID 4680 wrote to memory of 3104 4680 igfxdmx32.exe 117 PID 3104 wrote to memory of 876 3104 igfxdmx32.exe 118 PID 3104 wrote to memory of 876 3104 igfxdmx32.exe 118 PID 3104 wrote to memory of 876 3104 igfxdmx32.exe 118 PID 876 wrote to memory of 2844 876 igfxdmx32.exe 119 PID 876 wrote to memory of 2844 876 igfxdmx32.exe 119 PID 876 wrote to memory of 2844 876 igfxdmx32.exe 119 PID 2844 wrote to memory of 1524 2844 igfxdmx32.exe 120 PID 2844 wrote to memory of 1524 2844 igfxdmx32.exe 120 PID 2844 wrote to memory of 1524 2844 igfxdmx32.exe 120 PID 1524 wrote to memory of 3832 1524 igfxdmx32.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f87b58d86ef145e2733f639ec026ae7b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Users\Admin\AppData\Local\Temp\F87B58~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4796 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3832 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1428 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4084 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3084 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3524 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1972 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3848 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2764 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3928 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4952 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2600 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4840 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5072 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2440 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4400 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:548 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4432 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4964 -
C:\Windows\SysWOW64\igfxdmx32.exe"C:\Windows\system32\igfxdmx32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:4596
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5f87b58d86ef145e2733f639ec026ae7b
SHA10c972f1bdd17a707a6b6e1c2a5591be52f0130a5
SHA256a37c4ab377ffa605695dcfd0a7a68aa3d2277ffa421923472754473e38e30e48
SHA512142d1012ee4d74d27e28db249447a0cb38ef48c9ea63bd45f593c8670cc437801d8e2bd26d3f5ba84d9dc681c244696d564525234d2a88fcb5b21cd7a00c1886